IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 3216 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
PN 2024-03-14
15:25
Kagoshima
(Primary: On-site, Secondary: Online)
[Special Invited Talk] Aiming for the future optical networks -- 20 years with PN-TC and Keio Future Optical Network Open Research Center --
Naoaki Yamanaka (Keio Univ.) PN2023-75
 [more] PN2023-75
pp.32-36
PN 2024-03-15
10:10
Kagoshima
(Primary: On-site, Secondary: Online)
Optically powered antenna unit with remotely optical amplification using a multi core fiber
Mizuki Fukuyama, Motoharu Matsuura (UEC), Hidenori Takahashi, Noboru Yashikane, Takehiro Tsuritani (KDDI Research, Inc.) PN2023-79
We experimentally demonstrate a simultaneous transmission of data signal, feed light and pump light using a multi-core f... [more] PN2023-79
pp.53-57
PN 2024-03-15
10:30
Kagoshima
(Primary: On-site, Secondary: Online)
Power Saving Effects in Switched RoF
Ryuta Murakami (Keio Univ.), Satoru Okamoto (UEC), Yoshihiko Uematsu, Takashi Kurimoto, Naoaki Yamanaka (Keio Univ.) PN2023-80
In order to realize higher speeds and greater capacity in the Beyond 5G era, it is expected to handle higher frequency b... [more] PN2023-80
pp.58-63
KBSE 2024-03-14
17:10
Okinawa Okinawa Prefectual General Welfare Center
(Primary: On-site, Secondary: Online)
Reusable Self-Adaptive Intrusion Recovery for Cloud Native Applications
Takumi Ikeda, Takuto Yamauchi (Waseda Univ.), Kenji Tei (Tokyo Tech) KBSE2023-79
Research is being conducted on self-adaptive technologies that monitor, analyze, plan and execute adaptive actions at ru... [more] KBSE2023-79
pp.79-81
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
IA, SITE, IPSJ-IOT [detail] 2024-03-13
11:35
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Law and Policy on the Cybersecurity Supply Chain in the European Union
Yusuke Tachibana (FIT) SITE2023-95 IA2023-101
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] SITE2023-95 IA2023-101
pp.169-171
NLC, IPSJ-NL 2024-03-10
18:55
Hyogo
(Primary: On-site, Secondary: Online)
Language Model for Variable Definition Extraction from Chemical Process-related Papers
Shota Kato, Kotaro Nagayama, Manabu Kano (Kyoto Univ.) NLC2023-25
Extracting variable definitions from scientific papers is crucial for understanding and leveraging research findings, ye... [more] NLC2023-25
pp.13-18
SS 2024-03-07
15:25
Okinawa
(Primary: On-site, Secondary: Online)
SS2023-57 While code review plays a crucial role in enhancing software quality, it remains time-consuming. Over the years, various... [more] SS2023-57
pp.49-54
PRMU, IBISML, IPSJ-CVIM 2024-03-03
16:45
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Visualization of diverse solutions with different number of topics in topic models
Toshio Uchiyama, Tsukasa Hokimoto (HIU) IBISML2023-44
The Latent Dirichlet analysis is known as a topic model that is useful
for analyzing data such as documents. The hiera... [more]
IBISML2023-44
pp.29-35
MI 2024-03-03
17:18
Okinawa OKINAWAKEN SEINENKAIKAN
(Primary: On-site, Secondary: Online)
3D shape reconstruction of colon with model-based unsupervised depth estimation
Natsu Onozaka (Nagoya Univ.), Hayato Itoh (Fukuoka Univ.), Masahiro Oda (Nagoya Univ.), Masashi Misawa (Showa Univ.), Yuichi Mori (UiO), Shin-ei Kudo (Showa Univ.), Kensaku Mori (Nagoya Univ.) MI2023-60
We propose unsupervised trainig for the pose estimation in 3D reconstrcution of the colon from colonoscopic images by cl... [more] MI2023-60
pp.87-90
MI 2024-03-04
10:22
Okinawa OKINAWAKEN SEINENKAIKAN
(Primary: On-site, Secondary: Online)
Robust segmentation approach over various training-to-test ratios for gross tumor volumes of lung cancer based on fused outputs
Yunhao Cui, Hidetaka Arimura (Kyushu Univ.), Yuko Shirakawa (National Hospital Organization Kyushu Cancer), Tadamasa Yoshitake (Kyushu Univ.), Yoshiyuki Shioyama (Saga HIMAT), Hidetake Yabuuchi (Kyushu Univ.) MI2023-68
This study investigates robust deep learning (DL) methods for segmenting lung cancer from stereotactic body radiotherapy... [more] MI2023-68
pp.117-118
MI 2024-03-04
15:22
Okinawa OKINAWAKEN SEINENKAIKAN
(Primary: On-site, Secondary: Online)
Prediction of Cancer Relapse for Non-Small Cell Lung Cancer Patients Using Clinical and Imaging Features Before Stereotactic Ablative Radiotherapy
Takumi Kodama, Hidetaka Arimura (Kyushu Univ.), Yuko Shirakawa (Kyushu Cancer Center), Kenta Ninomiya (Sanford Burnham Prebys Med. Discov. Inst.), Tadamasa Yoshitake (Kyushu Univ.), Yoshiyuki Shioyama (SAGA HIMAT) MI2023-85
The aim of this study is to predict locoregional relapse and distant metastasis in stage I non-small cell lung cancer pa... [more] MI2023-85
pp.173-175
EMM 2024-03-02
14:00
Overseas Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency [Poster Presentation] Improved Ultimate Link without markers for projective transformation
Keiji Yamadera, Michiharu Niimi (KIT) EMM2023-90
We propose a method that links character string having a certain semantic meaning on papers in real world to the digital... [more] EMM2023-90
pp.7-12
ET 2024-03-03
12:40
Miyazaki Miyazaki University Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education
Kazuaki Yoshihara (Kindai Univ.) ET2023-68
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] ET2023-68
pp.100-103
HCS 2024-03-02
14:05
Shizuoka Tokoha University(Shizuoka-Kusanagi Campus) Online Dialogue Environment Design for Effective Use of Collective Intelligence in Group Problem Solving
Masanari Ichikawa, Yugo Takeuchi (Shizuoka Univ.) HCS2023-96
This study conducted an experiment in which participants generated ideas in a face-to-face situation that simulated an o... [more] HCS2023-96
pp.48-53
EMD 2024-03-01
13:45
Chiba   A study on analysis of rotation phenomena of MMF speckle patterns with deep learning
Ryusei Sato, Makoto Hasegawa (Chitose Inst. of Science and Technology) EMD2023-41
When laser light beams are allowed to propagate from one end of an optical fiber to the other end and further to be outp... [more] EMD2023-41
pp.13-18
NS, IN
(Joint)
2024-02-29
09:45
Okinawa Okinawa Convention Center Performance Comparison of Raspbian and LineageOS on Raspberry Pi Hardware
Toshihiro Matsuda, Kien Nguyen, Hiroo Sekiya (Chiba Univ.) NS2023-191
In recent years, there has been a proliferation of IoT applications, including smart homes, smart agriculture, and smart... [more] NS2023-191
pp.113-118
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center An automatic optimal placement system for applications in MEC environment
Mudai Kobayashi, Mohammad Mikal Bin Amrul Halim Gan, Takahisa Seki (SoftBank), Takahiro Hirofuchi, Ryousei Takano, Mitsuhiro Kishimoto (AIST) NS2023-235
In post-5G, distributed systems need to process real-world information in real time in a scalable manner. In this paper,... [more] NS2023-235
pp.373-378
VLD, HWS, ICD 2024-03-01
10:50
Okinawa
(Primary: On-site, Secondary: Online)
Pseudo-random Number Generator Design Robust against Fault Injection Attacks
Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] VLD2023-123 HWS2023-83 ICD2023-112
pp.125-130
VLD, HWS, ICD 2024-03-01
15:30
Okinawa
(Primary: On-site, Secondary: Online)
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium
Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] VLD2023-130 HWS2023-90 ICD2023-119
pp.161-166
 Results 21 - 40 of 3216 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan